Topics
Contributors
- David F. Hauge
- Sanford L. Michelman
- Matthew R. Lasky
- Todd H. Stitt
- Kraig Ahalt
- Robert N. Berg
- Jason Blackstone
- Howard I. Camhi
- Ronald R. Camhi
- Stacey Chiu
- Jesse Contreras
- Seth E. Darmstadter
- Neil Eddington
- Robert D. Estrin
- Jeffrey D. Farrow
- Derrick Fong-Stempel
- Mark Frimmel
- Samantha Gavin
- John J. Giardino
- Tim Gorry
- Kelly M. Hagemann
- Mona Z. Hanna
- Claire Hoffman
- Ryan Hong
- Marc R. Jacobs
- Bryan Johnson
- Gozde Kabadayi
- Shaina L. Kinsberg
- Warren A. Koshofer
- Dana A. Kravetz
- Samuel M. Licker
- Vincent S. Loh
- Jennifer A. Mauri
- Amanda K. Monroe
- Megan J. Penick
- Michael S. Poster
- Mark B. Robinson
- Lara A. H. Shortz
- Adam Z. Solomon
- Peter L. Steinman
- Lazar Sterling-Jackson
- Scott D. Tenley
- Bianka E. Valbrun
- Stephen Weiss
- Matthew E. Yarbrough
Archives
Contact
Paul Zimmerman
pzimmerman@mrllp.com
310.299.5500
Showing 4 posts by Jason Blackstone.

Preserving the Confidentiality of Cybersecurity Forensic Reports
Your company’s computer network has been breached and confidential customer data stolen. Not surprisingly, this results in a lawsuit filed against you by down-the-line victims; read, customers whose personal information found its way into the wrong hands.
In response to the breach, you did all the right things, including hiring experts to investigate and provide a forensic report. But to your dismay, that report—which includes some rather sensitive and potentially damaging information—has become subject of discovery in the litigation. What are you to do? (Read More)

5 Ways Blockchain Technology Will Change The Legal Industry
Blockchain technology is changing the world as we know it. Indeed, the investment opportunities it has spawned—namely, cryptocurrency and NFTs—have captured imaginations worldwide.
Headlines about newly minted crypto millionaires and eye-popping NFT deals aside, there are many questions surrounding blockchains (both private and public), including uncertainty about who bears responsibility for maintaining privately-owned blockchains versus public ones that are sustained by way of mining requirements or gas fees. (Read More)

For Cyber and Data Security, Companies Are Only as Strong as Their Weakest Links
Cybercrime is on the rise and continues to come in all shapes and sizes. Late last month, it was discovered that hackers gained access to the underlying blockchain that powers Axie Infinity, a very popular NFT-based online video game, and stole the equivalent of $625 million in cryptocurrency. The breach represents the second biggest hack in crypto history. (Read More)

NFTs and IP: What Owners And Sellers Need to Know
Blockchain technology is changing the world. With it has come a whole new category of investment opportunities, including non-fungible tokens—better known as NFTs—which have been fodder for headlines since breaking into the mainstream in 2021.
It’s the sky-high purchase prices of NFTs that’ve garnered most of the attention since they became popular last year. But behind these attention-grabbing transactions are the intellectual property considerations that NFT owners and sellers—brands included—must keep top of mind. (Read More)